WIB Mini-Seminar, The Hague (21 st of March 2013) An update from the Control Systems Working Group

Size: px
Start display at page:

Download "WIB Mini-Seminar, The Hague (21 st of March 2013) An update from the Control Systems Working Group"

Transcription

1 WIB Mini-Seminar, The Hague (21 st of March 2013) An update from the Control Systems Working Group Kees Biesheuvel, DOW Product Manager MOD5 Engineering Solutions Jos Menting, Laborelec Belgium, CTO

2 The merger of two WIB Working Groups BPCS Working Group Plant Security Working Group 2013 Control Systems Working Group WIB

3 Who is active in the Control Systems Working Group? 1. Eric Abresch - Exxonmobil 2. Ted Angevaare Shell & Chairman 3. Kees Biesheuvel - DOW 4. Lex Boekel - Wintershall 5. Pascal vd Boogaard Shell 6. Guido de Bouver - M+W-group 7. Fabien Briere - Total (Fr) 8. Maarten de Caluwe DOW 9. Lion Demarteau - Sitech 10. Jimmy Denis - Laborelec 11. Ruud Denneman - Total 12. Mahdi Elkawafi - Wintershall 13. Sierk Goedemoed Heineken 14. Dominic de Kerf - Cargill 15. Michiel Kleisen - Dupont 16. Tom Koeken - EdeA 17. Peter Kwaspen Shell 18. Patrick Lienart - Total (Fr) 19. Mart Louisse - Aramco 20. Joris Meijs - AkzoNobel 21. Jos Menting Laborelec & Board 22. Onno Moret - Wintershall 23. Jos Oelers - Sabic 24. Kevin Orr - Solar Turbines 25. Frank Pijnenburg - DSM 26. Joost Roldaan - Heineken 27. Chris Sandford Wurldtech (Guest Mem) 28. Andre Schepens - Dow 29. Frans Staes - Cargill 30. Maximilien Simons - Solvay 31. Gerard Valkema - AkzoNobel 32. Edwin Vandeneynde - Solvay 33. Anneke Vemer - Exxonmobil 34. Lou Verhagen - AkzoNobel 35. Martin Visser - Waternet 36. Dick de Wagenaar - Q8 37. Jos Wenmeckers EdeA (Alphabetic-order)

4 New Plan of Action: First a strategy document shall be produced to provide steer to the Control Systems Working Group: Strategy is the direction and scope of an organization over the long-term: which achieves advantage for the organization through its configuration of resources within a challenging environment, to meet the needs of markets and to fulfill stakeholder expectations : The following subject will be addressed in the strategy document: 1- Sharing knowledge 2- IT security 3- Obsolescence /Life Cycle 4- Common voice to vendors Plant Security 5- Migration The Control Systems Working Group will be active on technical subjects and not on financial/commercial subjects. Dedicated Task Forces will be create to deal with specific subjects in more detail and to work on the subject to create a deliverable, such as a document or a presentation.

5 WIB MISSION Facilitate exchange of experience and expertise amongst end-users and with vendors of C&A Provide requirements, selection and application guidance through independent evaluation Tom Kuperij Managing Director March 25,

6 The old WIB Plant Security Workgroup Mission Statement from 2007: 1. Mitigate the threats to industrial automation, measurement & control equipment and systems created by Cyber Security risks; 2. Main focus area will be to generate minimum standards or create references to minimum International Standards and Guidelines to allow the WIB members to speak with one voice to the industrial automation Vendors to allow them to improve their products and services; 3. Create metrics to measure the level of protection to cyber security threats; 4. Provide guidance to the WIB members in the certification of Process Control Security products and services; Ref.:

7 New Plan of Action: The following Task Forces have been created: Task Force: PCD Security Metrics Who: Ruud Denneman Typical Best Practice Architectures Lex Boekel / Maarten de Caluwe / Guido de Bouver Security Management Accreditation + Certification FAT-SAT PCD Security Standards + Guidelines Pro-Active Security Definitions to/from suppliers Tom Koeken / Frans Staes Frank Pijnenburg Pascal vd Boogaard (in combination with LOGIIC) Ted Angevaare Frans Staes Kees Biesheuvel Life Cycle Management Jos Oelers / Onno Moret / Frank Pijnenburg / Lou Verhagen = More details provided in this presentation

8 Typical Best Practice Architectures: Create best practice architecture per vendor (secure high availability high integrity for L1 and L2 (L3)) Define what is required to create a typical architecture. Decided is to ask vendors to present/supply their vision on secure architecture based on their products Vendor: Siemens Rockwell ABB Emerson Honeywell Invensys Hima General Electric Yokogawa Bentley Nevada PILZ Beckhoff RTP Who: Michiel Kleisen - Dupont Frans Staes - Cargill Martin Visser - Waternet Ted Angevaare - Shell Michiel Kleisen - Dupont Lou Verhagen - AkzoNobel Kees Biesheuvel - DOW Jos Menting - Laborelec Ted Angevaare - Shell Peter Kwaspen - Shell Frans Staes - Cargill Onno Moret - Wintershall Kees Biesheuvel - DOW

9 Evolution towards international standards: downloads DACA security standards and experiences Less than 50% content from ISO IDEAL standard is selection of relevant IT requirements from various standards WIB Report M 2784 X10, version 1 WIB Report M 2784 X10, version 2 IEC proposal International standard Cyber Security Procurement Language for Control Systems by DHS IEC

10 Current IEC framework: 10

11 IEC process and present status now 11

12 Business case of certification: 12

13

WIB Functional Safety

WIB Functional Safety WIB Functional Safety From Interpretation to successful Implementation March 21, 2013 Leon Heemels Functional Safety workgroup Functional Safety workgroup Scope of this workgroup Participants Workgroup

More information

Global Industrial Cyber Security Professional GICSP

Global Industrial Cyber Security Professional GICSP Global Industrial Cyber Security Professional GICSP A certification for Engineers, ICS Security Professionals, and ICS Technology Specialists ARC Industry Forum, Feb 10, 2014 SANS ICS Resources Control

More information

ISA Security. Compliance Institute. Role of Product Certification in an Overall Cyber Security Strategy

ISA Security. Compliance Institute. Role of Product Certification in an Overall Cyber Security Strategy ISA Security Role of Product Certification in an Overall Cyber Security Strategy Tom Culling Chevron Andre Ristaino ASCI Kevin Staggs - Honeywell John Cusimano exida 1 ISA Security Agenda Who is the ISA

More information

ISA Security Compliance Institute

ISA Security Compliance Institute ISA Security Compliance Institute Johan Nye Chairman ISCI Governing Board 1 ISA Security Compliance Institute agenda topics About ISA Security Compliance Institute (ISCI) About ISA 99 Standards 2013 ISCI

More information

ISA Security Compliance Institute ISASecure IACS Certification Programs

ISA Security Compliance Institute ISASecure IACS Certification Programs ISA Security Compliance Institute ISASecure IACS Certification Programs This paper describes how international industrial cybersecurity standards and complementary conformance certification programs should

More information

Kevin Staggs - CISSP February 2, 2009. Patch Management

Kevin Staggs - CISSP February 2, 2009. Patch Management Kevin Staggs - CISSP February 2, 2009 Patch Management Topics Our philosophy Advice to our customers Patch qualification and management How we support our customers Industry needs Resources Summary 2 Our

More information

Roadmaps to Securing Industrial Control Systems

Roadmaps to Securing Industrial Control Systems Roadmaps to Securing Industrial Control Systems Insert Photo Here Mark Heard Eastman Chemical Company Rockwell Automation Process Solutions User Group (PSUG) November 14-15, 2011 Chicago, IL McCormick

More information

Vision & Positioning Statement For Wurldtech Labs

Vision & Positioning Statement For Wurldtech Labs Vision & Positioning Statement For Wurldtech Labs Wurldtech Security Technologies s Industrial Cyber Security Solutions For Global Process Automation & Control System Stakeholders Presentation Purpose

More information

ISA Security Compliance Institute

ISA Security Compliance Institute ISA Security Compliance Institute Andre Ristaino, Managing Director, ISCI 28 May 2013 CSSC 1 ISA Security Compliance Institute agenda topics About ISA Security Compliance Institute (ISCI) About ISA 99

More information

ARC INDUSTRY FORUM 2015

ARC INDUSTRY FORUM 2015 ARC INDUSTRY FORUM PRESENTATION TOPIC: MANAGING INDUSTRIAL CYBER SECURITY RISK Tyler Williams Manager, Industrial Cyber Security Shell Global Solutions tyler.williams@shell.com 1 THE TRADITIONAL APPROACH

More information

Security Levels in ISA-99 / IEC 62443

Security Levels in ISA-99 / IEC 62443 Summary Assessment of the security protection of a plant A Security Protection Level has to be assessed in a plant in operation A Protection Level requires both: The fulfillment of the policies and procedures

More information

The Group CYTEK CYTEK PROJECTS CONSULTING

The Group CYTEK CYTEK PROJECTS CONSULTING Corporate Overview The Group CYTEK CYTEK PROJECTS CYTEK AUTOMATION CONSULTING Platform Independent Automation & Industrial IT Consultancy and Project Management Services Group since 1993 200 plus staff

More information

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security? ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security? Agenda Threats Risk Assessment Implementation Validation Advanced Security Implementation Strategy

More information

Cybersecurity & the Water Sector

Cybersecurity & the Water Sector Cybersecurity & the Water Sector NAWC Water Summit October 6, 2013 San Diego, CA Kevin Morley, AWWA How to deal with Cyber Threat? How would our operations change if we did not have SCADA working? How

More information

Cybersecurity for Energy Delivery Systems 2010 Peer Review. Dale Peterson Digital Bond, Inc. Bandolier and Portaledge

Cybersecurity for Energy Delivery Systems 2010 Peer Review. Dale Peterson Digital Bond, Inc. Bandolier and Portaledge Cybersecurity for Energy Delivery Systems 2010 Peer Review Alexandria, VA July 20-22, 2010 Dale Peterson Digital Bond, Inc. Bandolier and Portaledge Summary Slide: Bandolier Outcomes: Insure new and upgraded

More information

ESKISP6056.01 Direct security testing

ESKISP6056.01 Direct security testing Direct security testing Overview This standard covers the competencies concerning with directing security testing activities. It includes setting the strategy and policies for security testing, and being

More information

Chemical Sector Cyber Security Program

Chemical Sector Cyber Security Program Chemical Sector Cyber Security Program Christine Adams, Director, Chemical Sector Cyber Security Program Neil Hershfield, Director, CIDX Cyber Security Initiative Cyber Security Program Leadership Executive

More information

Financial Services Practice. Bridging the gap between business & technology

Financial Services Practice. Bridging the gap between business & technology Financial Services Practice Bridging the gap between business & technology What we do 02 Purple allows its clients to have a single entity to manage its technology portfolio so that they can focus on achieving

More information

Rethinking Cyber Security for Industrial Control Systems (ICS)

Rethinking Cyber Security for Industrial Control Systems (ICS) Rethinking Cyber Security for Industrial Control Systems (ICS) Bob Mick VP Emerging Technologies ARC Advisory Group bmick@arcweb.com 1 Rethinking Cyber Security We Now Have Years of Experience - Security

More information

Process Automation and Instrumentation Market by Types, Technology, Application and by Geography - Analysis & Global Forecasts to 2013-2020

Process Automation and Instrumentation Market by Types, Technology, Application and by Geography - Analysis & Global Forecasts to 2013-2020 Brochure More information from http://www.researchandmarkets.com/reports/2852831/ Process Automation and Instrumentation Market by Types, Technology, Application and by Geography - Analysis & Global Forecasts

More information

Harnessing the power of change ABB Automation & Power World March 2-5, 2015 Houston, TX. Curriculum for Harmony

Harnessing the power of change ABB Automation & Power World March 2-5, 2015 Houston, TX. Curriculum for Harmony Register today at www.abb.com/apw2015 Harnessing the power of change ABB Automation & Power World March 2-5, 2015 Houston, TX Curriculum for Harmony Monday, March 2 401101 Windows XP support: what to do

More information

AUTOMATION AND PROCESS CONTROL

AUTOMATION AND PROCESS CONTROL AUTOMATION AND PROCESS CONTROL THE CONTROL TECHNOLOGY GROUP FAST GROUP Since 1982, the year in which it was established, FAST has represented a costant reference point on the international scene for supplies

More information

Shared Infrastructure: What and Where is Collaboration Needed to Build the SM Platform?

Shared Infrastructure: What and Where is Collaboration Needed to Build the SM Platform? Smart Manufacturing Forum Shared Infrastructure: What and Where is Collaboration Needed to Build the SM Platform? 10:45-11:45am panel discussion Moderator: John Bernaden, Vice Chair, Smart Manufacturing

More information

Team A SaaS Strategy

Team A SaaS Strategy Team A SaaS Strategy What is a strategy? Strategy is the direction and scope of an organization over the long-term term: : which achieves advantages for the organization through its configuration of resources

More information

Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT

Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT December 3, 2013 slide 1 A global leader in power and

More information

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas

More information

Process Automation - History and Future

Process Automation - History and Future Christer Rameback Vice President Process Automation Process Automation - History and Future ABB Automation Technology - 1 - Facts about ABB ABB Automation Technology - 2 A leading power and automation

More information

Control System Integrity (CSI) Tools and Processes to Automate CIP Compliance for Control Systems

Control System Integrity (CSI) Tools and Processes to Automate CIP Compliance for Control Systems Control System Integrity (CSI) Tools and Processes to Automate CIP Compliance for Control Systems James Goosby Manager I&C Systems and Field Support 19 th Annual ARC Industry Forum Agenda About Us Compliance

More information

Transforming Control System to a Virtualized Platform, including On Process Migration. Anneke Vemer ExxonMobil

Transforming Control System to a Virtualized Platform, including On Process Migration. Anneke Vemer ExxonMobil Transforming Control System to a Virtualized Platform, including On Process Migration Anneke Vemer ExxonMobil ARC conference, Antwerp, 5-Mar-2013 Cleared ExxonMobil External Technical Publication 2013.1104

More information

Applying ISA/IEC 62443 to Control Systems MESAKNOWS. Graham Speake. Principal Systems Architect Yokogawa. Do you know MESA? Additional partner logos

Applying ISA/IEC 62443 to Control Systems MESAKNOWS. Graham Speake. Principal Systems Architect Yokogawa. Do you know MESA? Additional partner logos Applying ISA/IEC 62443 to Control Systems Graham Speake Principal Systems Architect Yokogawa Additional partner logos MESAKNOWS SUSTAINABILITY & ECO EFFICIENCY LEAN METRICS & PERFORMANCE MANAGEMENT INFORMATION

More information

The Open Group 2011. Cloud Work Group

The Open Group 2011. Cloud Work Group The Open Group Cloud Work Group 18 May 2011 Heather Kreger SOA WG co-chair Liaison for SOA, Cloud IBM Cornwallis Rd B062, M307 Research Triangle Park, NC Tel 919-496-9572 Kreger@us.ibm.com www.opengroup.org

More information

Industrial Cyber Security 101. Mike Spear

Industrial Cyber Security 101. Mike Spear Industrial Cyber Security 101 Mike Spear Introduction Mike Spear Duluth, GA USA Global Operations Manager, Industrial Cyber Security Mike.spear@honeywell.com Responsible for the Global Delivery of Honeywell

More information

Whitepaper. Personnel Functional Safety Certification: Not All Programs Are Created Equal. Summary

Whitepaper. Personnel Functional Safety Certification: Not All Programs Are Created Equal. Summary Whitepaper Personnel Functional Safety Certification: Not All Programs Are Created Equal Summary As production runs ever closer to equipment and facility operating limits and new plants come on line in

More information

Manage Release and Deployment

Manage Release and Deployment Manage Release and Deployment Description Once development is complete, new and enhanced services need to be made operational. Effective requires planning, scheduling and controlling the implementation

More information

CONSULTANCY. Initial Terms of Reference Outbreaks and Humanitarian Emergencies Supply Chain Development Project

CONSULTANCY. Initial Terms of Reference Outbreaks and Humanitarian Emergencies Supply Chain Development Project CONSULTANCY Initial Terms of Reference Outbreaks and Humanitarian Emergencies Supply Chain Development Project This consultancy is requested by: Unit: Outbreaks & Humanitarian Emergencies (OHE) Department:

More information

ISA99 Working Group 5 ISA99 Working Group 5

ISA99 Working Group 5 ISA99 Working Group 5 Date: May 14, 2015 Time: 11:00 ET US Lead: E. Cosman Notes: E. Cosman Distribution: ISA99 committee and stakeholders ISA99 Working Group 5 ISA99 Working Group 5 ISA 67 Alexander Drive PO Box 12277 Research

More information

RESPONSIBLE CARE GLOBAL CHARTER. A Special Supplement Presented with

RESPONSIBLE CARE GLOBAL CHARTER. A Special Supplement Presented with RESPONSIBLE CARE GLOBAL CHARTER A Special Supplement Presented with GLOBAL CHARTER INTRODUCTION 4 ELEMENTS OF THE GLOBAL CHARTER 5 CORE PRINCIPLES 6 FUNDAMENTAL FEATURES 6 SUSTAINABLE DEVELOPMENT 8 CONTINUOUS

More information

Session 14: Functional Security in a Process Environment

Session 14: Functional Security in a Process Environment Abstract Session 14: Functional Security in a Process Environment Kurt Forster Industrial IT Solutions Specialist, Autopro Automation Consultants In an ideal industrial production security scenario, the

More information

IEC 61850 A New Perspective in Substation Automation

IEC 61850 A New Perspective in Substation Automation Sol Lindström IEC 61850 A New Perspective in Substation Automation ABB Power Technologies All rights reserved. -1-5/4/2004 Towards a Global Solution for......substation Automation Systems Experience in:

More information

Fundamentals for EHR Success

Fundamentals for EHR Success Fundamentals for EHR Success Angie Chew Monksfield Principal of Portfolio Lim Shih Hsien Deputy Director, Information Security Knowing the Pain Points This material contains information that is confidential

More information

Roles & Grades Rate Cards and Applicable SFIA Skills

Roles & Grades Rate Cards and Applicable SFIA Skills Roles & s Rate Cards and Applicable Consultant Day Rate Card Consultant Day Rate Lead 900.00 Senior 800.00 Junior 0.00 CLAS Consultant and Competencies Lead CLAS Consultant Lead CLAS Consultant IT Governance

More information

N.K. Srivastava GM-R&M-Engg.Services NTPC- CC/Noida nksrivastava@ntpceoc.co.in

N.K. Srivastava GM-R&M-Engg.Services NTPC- CC/Noida nksrivastava@ntpceoc.co.in N.K. Srivastava GM-R&M-Engg.Services NTPC- CC/Noida nksrivastava@ntpceoc.co.in JULY 2012 ARC- Transforming Industry and Infrastructure through New Processes and Technologies Presentation Road Map Introduction

More information

ESKISP6046.02 Direct security architecture development

ESKISP6046.02 Direct security architecture development Overview This standard covers the competencies concerned with directing security architecture activities. It includes setting the strategy and policies for security architecture, and being fully accountable

More information

Technical Project Manager JOB DESCRIPTION

Technical Project Manager JOB DESCRIPTION JOB TITLE: BUSINESS UNIT: REPORTS TO: Technical Project Manager ICT Manager, ICT EA GRADE: Non-EA Position DATE APPROVED: 17/12/2015 JOB SPECIFICATION SUMMARY OF THE BROAD PURPOSE OF THE JOB The Technical

More information

Cyber security offensive and defensive strategies An Intelligent Utility Reality Webcast

Cyber security offensive and defensive strategies An Intelligent Utility Reality Webcast Cyber security offensive and defensive strategies An Intelligent Utility Reality Webcast 10/15 10/29 January 7, 2010 1/28 Cyber security offensive and defensive strategies H. Christine Richards Vice President

More information

Industrial Automation Automation Industrielle Industrielle Automation

Industrial Automation Automation Industrielle Industrielle Automation 1.1 Automation Overview automación - vista general Automation -vue d'ensemble Automation - Übersicht Automation Industrielle Industrielle Automation Definition Automation (automation, Automation): 1) set

More information

OE PROJECT CHARTER TEMPLATE

OE PROJECT CHARTER TEMPLATE PROJECT : BearBuy Implementation PREPARED BY: Vanessa Wong and Jon Conhaim DATE (MM/DD/YYYY): 07/23/2011 PROJECT CHARTER VERSION HISTORY VERSION DATE COMMENTS (DRAFT, SIGNED, REVISED CURRENT STATUS) (MM/DD/YYYY)

More information

Industrial Control System Cyber Security

Industrial Control System Cyber Security 2012 Honeywell Users Group Asia Pacific Sustain.Ability. Industrial Control System Cyber Security 1 Honeywell Process Solutions Cyber Security Architect Global Architect Team Mike Baldi Responsible for

More information

BUSINESS TO MANUFACTURING (B2M) COLLABORATION BETWEEN BUSINESS AND MANUFACTURING USING ISA-95 ABSTRACT

BUSINESS TO MANUFACTURING (B2M) COLLABORATION BETWEEN BUSINESS AND MANUFACTURING USING ISA-95 ABSTRACT BUSINESS TO MANUFACTURING (B2M) COLLABORATION BETWEEN BUSINESS AND MANUFACTURING USING ISA-95 Dennis Brandl dennis.brandl@sequencia.com Sequencia Corporation ABSTRACT Integrating business and manufacturing

More information

Can Process Analyzers become part of the control loop?

Can Process Analyzers become part of the control loop? Can Process Analyzers become part of the control loop? Cees Didden Workgroup Process Analyzers March 21th 2013 THE ANSWER IS YES End of this lecture? From : G. Stephanopoulos, Chemical Process Control,

More information

OE PROJECT CHARTER TEMPLATE

OE PROJECT CHARTER TEMPLATE PROJECT : PREPARED BY: DATE (MM/DD/YYYY): Project Name Typically the Project Manager Project Charter Last Modified Date PROJECT CHARTER VERSION HISTORY VERSION DATE (MM/DD/YYYY) COMMENTS (DRAFT, SIGNED,

More information

Advanced automation and real-time business intelligence Solutions for the Energy & Utilities markets M A N A G I N G T H E E S S E N T I A L S

Advanced automation and real-time business intelligence Solutions for the Energy & Utilities markets M A N A G I N G T H E E S S E N T I A L S Advanced automation and real-time business intelligence Solutions for the Energy & Utilities markets M A N A G I N G T H E E S S E N T I A L S making a difference in system integration Capula is a leading

More information

It s about service. to clients to colleagues to community to country

It s about service. to clients to colleagues to community to country It s about service It s about service to clients to colleagues to community to country Delivering business strategy and mission-critical IT solutions and services for nearly two decades. 1 Source is a

More information

Global Consulting Services Overview. Peter Fischer Manager, Global Consulting May 5, 2011

Global Consulting Services Overview. Peter Fischer Manager, Global Consulting May 5, 2011 Global Consulting Services Overview Peter Fischer Manager, Global Consulting May 5, 2011 Overview Global Consulting Services at-a-glance Why Global Consulting Services Brief overview of current engagements

More information

Information Security Managing The Risk

Information Security Managing The Risk Information Technology Capability Maturity Model Information Security Managing The Risk Introduction Information Security continues to be business critical and is increasingly complex to manage for the

More information

FOR REVIEW PURPOSES ONLY!

FOR REVIEW PURPOSES ONLY! FOR REVIEW PURPOSES ONLY! THIS EXCERPT FROM AN ISA99 COMMITTEE WORK PRODUCT IS PROVIDED SOLELY FOR THE PURPOSE OF REVIEW IN SUPPORT OF THE FURTHER DEVELOPMENT OF OTHER COMMITTEE WORK PRODUCTS. THIS DOCUMENT

More information

STATE BOARD OF ELECTIONS P.O. BOX 6486, ANNAPOLIS, MD 21401-0486 PHONE (410) 269-2840

STATE BOARD OF ELECTIONS P.O. BOX 6486, ANNAPOLIS, MD 21401-0486 PHONE (410) 269-2840 MARYLAND STATE BOARD OF ELECTIONS P.O. BOX 6486, ANNAPOLIS, MD 21401-0486 PHONE (410) 269-2840 Bobbie S. Mack, Chairman David J. McManus, Jr., Vice Chairman Rachel T. McGuckian Patrick H. Murray Charles

More information

ARC Industry Forum, Orlando 2/13/2014. Overview. Martin Swaine 4D Program Manager, Shell P&T (Projects & Technology) Shell International

ARC Industry Forum, Orlando 2/13/2014. Overview. Martin Swaine 4D Program Manager, Shell P&T (Projects & Technology) Shell International ARC Industry Forum, Orlando 2/13/2014 Overview Martin Swaine 4D Program Manager, Shell P&T (Projects & Technology) Shell International 2001, CII Formed Fiatech Realize Best of What Is! Realize Best of

More information

ARC VIEW. Invensys and Microsoft Join Forces to Deliver Cloud-Based Manufacturing Solutions. Keywords. Summary. By Peter Reynolds

ARC VIEW. Invensys and Microsoft Join Forces to Deliver Cloud-Based Manufacturing Solutions. Keywords. Summary. By Peter Reynolds ARC VIEW OCTOBER 25, 2012 Invensys and Microsoft Join Forces to Deliver Cloud-Based Manufacturing Solutions By Peter Reynolds Keywords Azure, BPM, Cloud Computing, Invensys Operations Management, Historian,

More information

LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION LOGIIC Remote Access June 2015 Final Public Report Document Title LOGIIC Remote Monitoring Project Public Report Version Version 1.0 Primary Author A. McIntyre (SRI) Distribution Category LOGIIC Approved

More information

ISA-99 Industrial Automation & Control Systems Security

ISA-99 Industrial Automation & Control Systems Security ISA-99 Industrial Automation & Control Systems Security Jim Gilsinn National Institute of Standards & Technology (NIST) Engineering Laboratory ISA99 Committee Addresses Industrial Automation and Control

More information

Cyber Security Implications of SIS Integration with Control Networks

Cyber Security Implications of SIS Integration with Control Networks Cyber Security Implications of SIS Integration with Control Networks The LOGIIC SIS Project Standards Certification Education & Training Publishing Conferences & Exhibits Presenter Zach Tudor is a Program

More information

FOR REVIEW PURPOSES ONLY!

FOR REVIEW PURPOSES ONLY! FOR REVIEW PURPOSES ONLY! THIS EXCERPT FROM AN ISA99 COMMITTEE WORK PRODUCT IS PROVIDED SOLELY FOR THE PURPOSE OF REVIEW IN SUPPORT OF THE FURTHER DEVELOPMENT OF OTHER COMMITTEE WORK PRODUCTS. THIS DOCUMENT

More information

Providing Innovative Solutions

Providing Innovative Solutions Control Panel Design & Manufacturing Systems Integration EXCELLENCE IS OUR STANDARD (281) 530-3248 INTRODUCTION RAN Technologies offers manufacturing of high quality customized panels for the industrial

More information

International Chamber of Commerce The world business organization

International Chamber of Commerce The world business organization International Chamber of Commerce The world business organization ICC Cyber Security Guide for Business World Bank Seminar on Cyber Preparedness Vienna. 18 19 May 2015 Gerard Hartsink Chair ICC Task Force

More information

FOR REVIEW PURPOSES ONLY!

FOR REVIEW PURPOSES ONLY! FOR REVIEW PURPOSES ONLY! THIS EXCERPT FROM AN ISA99 COMMITTEE WORK PRODUCT IS PROVIDED SOLELY FOR THE PURPOSE OF REVIEW IN SUPPORT OF THE FURTHER DEVELOPMENT OF OTHER COMMITTEE WORK PRODUCTS. THIS DOCUMENT

More information

A Tactical Approach to Continuous Compliance. Walt Sikora, Vice President Security Solutions EMMOS 2013

A Tactical Approach to Continuous Compliance. Walt Sikora, Vice President Security Solutions EMMOS 2013 A Tactical Approach to Continuous Compliance Walt Sikora, Vice President Security Solutions EMMOS 2013 Abstract NERC has moved quickly to address shortcomings and lack of clarity in previous versions of

More information

Design Document Version 0.0

Design Document Version 0.0 Software Development Templates Design Document Version 0.0 Description of Project DOCUMENT NO: VERSION: CONTACT: EMAIL: Ivan Walsh DATE: 4/13/2004 Distribution is subject to copyright. Design Document

More information

Process Control Systems Forum (PCSF)

Process Control Systems Forum (PCSF) Process Control Systems Forum (PCSF) Michael Torppey Technical Manager, PCSF Senior Principal, Mitretek Systems Collaborating to Advance Control System Security Background Department of Homeland Security

More information

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information

More information

ESCoRTS A European network for the Security of Control & Real Time Systems

ESCoRTS A European network for the Security of Control & Real Time Systems ESCoRTS A European network for the Security of Control & Real Time Systems Luc Van den Berghe CEN-CENELEC Management Centre 20/05/10 Luxembourg workshop 1 Recommendations from a CEN/BT WG161 Survey in

More information

Standard for an Architectural Framework for the Internet of Things (IoT) IEEE P2413

Standard for an Architectural Framework for the Internet of Things (IoT) IEEE P2413 Standard for an Architectural Framework for the Internet of Things (IoT) IEEE P2413 Oleg Logvinov Chair of the IEEE P2413 Working Group Chair of the IEEE Internet Initiative Chair if the Industry Engagement

More information

Office of the Chief Information Officer

Office of the Chief Information Officer Office of the Chief Information Officer Business Plan: 2012 2015 Department / Ministère: Executive Council Date: November 15, 2012 1 P a g e This Page Left Intentionally Blank 2 P a g e Contents The Business

More information

Energy sector control centers across the nation, such as this one at Kansas City Power & Light, benefit from the system security assessments

Energy sector control centers across the nation, such as this one at Kansas City Power & Light, benefit from the system security assessments Energy sector control centers across the nation, such as this one at Kansas City Power & Light, benefit from the system security assessments performed through National SCADA Test Bed industry partnerships.

More information

DHS, National Cyber Security Division Overview

DHS, National Cyber Security Division Overview DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined

More information

Is your current safety system compliant to today's safety standard?

Is your current safety system compliant to today's safety standard? Is your current safety system compliant to today's safety standard? Abstract It is estimated that about 66% of the Programmable Electronic Systems (PES) running in the process industry were installed before

More information

Annexure-A (Qualifications & Job Description with Roles & Responsibilities) Job Description

Annexure-A (Qualifications & Job Description with Roles & Responsibilities) Job Description Annexure-A (Qualifications & Job Description with Roles & Responsibilities) Job Description Position / Designation Program Manager Level / Rank Principal Consultant Educational Qualifications Experience

More information

CSMS. Cyber Security Management System. Conformity Assessment Scheme

CSMS. Cyber Security Management System. Conformity Assessment Scheme CSMS Cyber Security Management System Conformity Assessment Scheme for the CSMS Certification Criteria IEC 62443-2-1:2010 Cyber Security Management Syste 1 Purpose of the CSMS Conformity Assessment Scheme

More information

Project Team Roles Adapted for PAAMCO

Project Team Roles Adapted for PAAMCO Project Team Roles Adapted for PAAMCO Project Roles, Authority & Responsibilities Role a defined funciton assumed by or assigned to a person in the project Authority the right to apply project resources,

More information

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance

More information

Avaya Strategic Communications. Consulting. A Strong Foundation for Superior Business Results. Table of Contents. Taking Business Vision to Reality

Avaya Strategic Communications. Consulting. A Strong Foundation for Superior Business Results. Table of Contents. Taking Business Vision to Reality Avaya Strategic Communications Consulting Table of Contents Taking Business Vision to Reality... 1 Section 1: The Technology Contribution Challenge..... 1 Section 2: A Systematic Approach for Ensuring

More information

Strategic payment solutions

Strategic payment solutions Strategic payment solutions About Eiger Systems Eiger Systems provides market leading software and services to meet the requirements of organisations implementing strategic payment solutions. We intentionally

More information

Voice Over IP Network Solution Design, Testing, Integration and Implementation Program Overview

Voice Over IP Network Solution Design, Testing, Integration and Implementation Program Overview Voice Over IP Network Solution Design, Testing, Integration and Implementation Program Overview 1/1 Table of Contents 1. Introduction...3 2. Executive Summary...4 3. Program Definition...5 3.1. Program

More information

Towards a standard approach to supply chain integrity. Claire Vishik September 2013

Towards a standard approach to supply chain integrity. Claire Vishik September 2013 Towards a standard approach to supply chain integrity Claire Vishik September 2013 1 Draws from: ENISA s report on this topic Slawomir Gorniak, European Network and Information Security Agency Demosthenes

More information

A Guide to the Cyber Essentials Scheme

A Guide to the Cyber Essentials Scheme A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: admin@crest-approved.org Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane

More information

Data Governance Update. BOE workshop January 30, 2014

Data Governance Update. BOE workshop January 30, 2014 Data Governance Update BOE workshop January 30, 2014 IT Leadership Brett Miller, Chief Technology Officer Dave Reid, Director Enterprise Application Architecture Chris Paschke, Manager Information Security

More information

Information Technology Project Management (ITPM)

Information Technology Project Management (ITPM) FUNCTIONAL AREA 10 Project Management (ITPM) Incumbents in this functional area direct information technology system solution and/or improvement projects for cost, time, scope, risk, and quality. They

More information

Dallas IIA Chapter / ISACA N. Texas Chapter. January 7, 2010

Dallas IIA Chapter / ISACA N. Texas Chapter. January 7, 2010 Dallas IIA Chapter / ISACA N. Texas Chapter Auditing Tuesday, October Project 20, 2009 Management Controls January 7, 2010 Table of Contents Contents Page # Project Management Office Overview 3 Aligning

More information

Protecting productivity with Plant Security Services

Protecting productivity with Plant Security Services Protecting productivity with Plant Security Services Identify vulnerabilities and threats at an early stage. Take proactive measures. Achieve optimal long-term plant protection. siemens.com/plant-security-services

More information

Development, Acquisition, Implementation, and Maintenance of Application Systems

Development, Acquisition, Implementation, and Maintenance of Application Systems Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of

More information

Resilient and Secure Solutions for the Water/Wastewater Industry

Resilient and Secure Solutions for the Water/Wastewater Industry Insert Photo Here Resilient and Secure Solutions for the Water/Wastewater Industry Ron Allen DA/Central and Steve Liebrecht Rockwell Automation Detroit W/WW Team Leader Cyber Security IT People Geeks How

More information

MNLARS Project Audit Checklist

MNLARS Project Audit Checklist Audit Checklist The following provides a detailed checklist to assist the audit team in reviewing the health of a project. Relevance (at this time) How relevant is this attribute to this project or audit?

More information

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience

More information

NGITS ITSM STRATEGY JAYASHREE RAGHURAMAN SHIVA CHANDRASHEKHER VIKAS SOLANKI

NGITS ITSM STRATEGY JAYASHREE RAGHURAMAN SHIVA CHANDRASHEKHER VIKAS SOLANKI NGITS ITSM STRATEGY JAYASHREE RAGHURAMAN SHIVA CHANDRASHEKHER VIKAS SOLANKI AGENDA JAYASHREE 1. Introduction 2. Problem Statement 3. Recommendations 4. Organization Structure 5. Roadmap 6. Cost Benefit

More information

Cyber Security Health Test

Cyber Security Health Test ENERGY Cyber Security Health Test Robin Massink 20-05-2014 1 DNV GL 2013 2014 20-12-2013 SAFER, SMARTER, GREENER Cyber security issues facing the utility industry We are moving from IEC60870-5-101/ DNP3

More information

integrate 2: Business Process Redesign

integrate 2: Business Process Redesign Nevada System of Higher Education integrate 2: Business Process Redesign Executive Summary TABLE OF CONTENTS I. BACKGROUND AND OBJECTIVES 2 II. METHODOLOGY AND APPROACH 3 III. PROJECT OUTCOMES 5 IV. MAJOR

More information

Building the business case for ITAM

Building the business case for ITAM Building the business case for ITAM Executive summary An ITAM Review reader asked: What data do I need to collect to show the value of my ITAM practice? This article attempts to answer that question, from

More information

Front End Engineering Design Capabilities

Front End Engineering Design Capabilities Front End Engineering Design Capabilities Why EMERSON? Aligning your project and business objectives while creating a solid, detailed project foundation begins with a Front End Engineering Design (FEED)

More information

1 ISA Security Compliance Institute

1 ISA Security Compliance Institute 1 ISA Security Compliance Institute Internationally Accredited Conformance Scheme ISASecure certification programs are accredited as an ISO/ IEC Guide 65 conformance scheme and ISO/IEC 17025 lab operations

More information

Historians and Production Management as Cloud Applications

Historians and Production Management as Cloud Applications Historians and Production Management as Cloud Applications Harry Forbes Senior Analyst ARC Advisory Group hforbes@arcweb.com Emerging Technologies Enable Information- Driven Manufacturing Big Data Analytics

More information